Active Directory FundamentalsRecent PostsTop Read Articles

Active Directory Users and Computers (ADUC) - An introduction and installation guide

Active Directory Users and Computers (ADUC) is a common tool used by administrators to carry out daily tasks and much more in Active Directory AD. Some of the tasks an administrator can perform with the help of this MMC snap-in are as follows: Create and manage AD objects, such as users, computers, groups, and contacts, along with their attributes. Create Organizational Units (OU), move…
Read more
Active Directory FundamentalsTop Read Articles

How to Raise Active Directory Forest Functional Level

What are Functional Levels? An Active Directory functional level determines what capabilities of Active Directory Domain Services (AD DS) are available for a particular forest or domain. The functional levels are specified in terms of Windows Server versions, as each version update brings with it a host of new AD DS functionalities. Functional levels have to be specified because their…
Read more
Active Directory FundamentalsTop Read Articles

Group Policy Backup

What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set of Group Policy configurations are bundled as Group Policy Objects (GPO) which can then be applied to objects. IT administrators take weeks and months to create GPOs that are customized to…
Read more
Active Directory FundamentalsTop Read Articles

Active Directory Maintenance Checklist

What you will learn from this article: There are so many moving parts related to Active Directory (AD). So, it is important to know how to monitor, report, fix and diagnose issues related to the different supporting technologies. Identifying bottlenecks and resolving them before they cause much harm improves productivity, ensures efficient usage of resources, maintains consistency in data and…
Read more
Active Directory Fundamentals

NTLM authentication and Kerberos Authentication Protocols Explained

What you will learn: A network needs to have security processes put in place to avoid the misuse of its resources. An authentication process goes a big way in identifying whether a person is who they say they are, or a fraud. Active Directory employed the NTLM authentication protocol to securely authenticate its users, which was then succeeded by the Kerberos authentication protocol. In this…
Read more